vrfcore.dll

Description: Application Verifier Provider - Core Verification and SDK

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.26100.4654

Architecture: 32-bit

Operating System: Windows NT

SHA256: 954244b043737d8f24813af5999f279c

File Size: 170.4 KB

Uploaded At: Dec. 1, 2025, 8:06 a.m.

Views: 8

Exported Functions

  • AVrfAPILookupCallback (Ordinal: 1, Address: 0x3290)
  • VerifierGetInfoForException (Ordinal: 2, Address: 0x4b20)
  • VerifierAreStaticDllsInitialized (Ordinal: 3, Address: 0x45f0)
  • VerifierChainDuplicateHooks (Ordinal: 4, Address: 0x46f0)
  • VerifierCloseLayerProperties (Ordinal: 5, Address: 0x3f30)
  • VerifierConfigureStopOptions (Ordinal: 6, Address: 0x48e0)
  • VerifierCreateLayerProperties (Ordinal: 7, Address: 0x3e90)
  • VerifierDisableFaultInjectionExclusionRange (Ordinal: 8, Address: 0xae10)
  • VerifierDisableFaultInjectionTargetRange (Ordinal: 9, Address: 0xac80)
  • VerifierDisableLayer (Ordinal: 10, Address: 0x79f0)
  • VerifierDisableVerifier (Ordinal: 11, Address: 0x7f30)
  • VerifierEnableFaultInjectionExclusionRange (Ordinal: 12, Address: 0xad20)
  • VerifierEnableFaultInjectionTargetRange (Ordinal: 13, Address: 0xab90)
  • VerifierEnableLayer (Ordinal: 14, Address: 0x73a0)
  • VerifierGetAppCallerAddress (Ordinal: 15, Address: 0x6b80)
  • VerifierGetLoggingDirectory (Ordinal: 16, Address: 0x45c0)
  • VerifierGetRecursionTlsSlot (Ordinal: 17, Address: 0x4670)
  • VerifierHandleVerifierStopException (Ordinal: 18, Address: 0x4930)
  • VerifierIsDllEntryActive (Ordinal: 19, Address: 0x4890)
  • VerifierIsInsideVerifierStop (Ordinal: 20, Address: 0x48c0)
  • VerifierIsLayerEnabled (Ordinal: 21, Address: 0x4430)
  • VerifierLdrGetProcedureAddress (Ordinal: 22, Address: 0x4860)
  • VerifierOpenLayerProperties (Ordinal: 23, Address: 0x3df0)
  • VerifierQueryGlobalProperties (Ordinal: 24, Address: 0x4940)
  • VerifierQueryLayerBreak (Ordinal: 25, Address: 0x4150)
  • VerifierQueryLayerBreaks (Ordinal: 26, Address: 0x4100)
  • VerifierQueryLayerProperties (Ordinal: 27, Address: 0x3f50)
  • VerifierQueryLayerProperty (Ordinal: 28, Address: 0x4090)
  • VerifierQueryRegisteredLayers (Ordinal: 29, Address: 0x7210)
  • VerifierRegisterFaultInjectProvider (Ordinal: 30, Address: 0xa900)
  • VerifierRegisterLayer (Ordinal: 31, Address: 0x6d50)
  • VerifierRegisterLayerEx (Ordinal: 32, Address: 0x6d70)
  • VerifierRegisterProvider (Ordinal: 33, Address: 0x9e30)
  • VerifierResetFaultInjectionAddressRanges (Ordinal: 34, Address: 0xaeb0)
  • VerifierSetAPIClassName (Ordinal: 35, Address: 0xaf60)
  • VerifierSetFaultInjectionProbability (Ordinal: 36, Address: 0xaa80)
  • VerifierSetFaultInjectionSeed (Ordinal: 37, Address: 0xab00)
  • VerifierSetLayerBreak (Ordinal: 38, Address: 0x4270)
  • VerifierSetLayerProperty (Ordinal: 39, Address: 0x4530)
  • VerifierShouldFaultInject (Ordinal: 40, Address: 0xa980)
  • VerifierStopMessageEx (Ordinal: 41, Address: 0x3750)
  • VerifierSuspendFaultInjection (Ordinal: 42, Address: 0xab30)
  • VerifierTlsGetValue (Ordinal: 43, Address: 0x95b0)
  • VerifierTlsSetValue (Ordinal: 44, Address: 0x95f0)
  • VerifierUnregisterLayer (Ordinal: 45, Address: 0x6d90)

Imported DLLs & Functions

ntdll.dll
  • _stricmp (Address: 0x10019054)
  • _vsnprintf (Address: 0x10019038)
  • _vsnwprintf (Address: 0x10019024)
  • _wcsicmp (Address: 0x1001902c)
  • _wcsnicmp (Address: 0x1001901c)
  • DbgPrint (Address: 0x100190c0)
  • DbgPrintEx (Address: 0x10019004)
  • LdrAccessResource (Address: 0x10019090)
  • LdrDisableThreadCalloutsForDll (Address: 0x10019118)
  • LdrEnumerateLoadedModules (Address: 0x10019014)
  • LdrFindEntryForAddress (Address: 0x10019018)
  • LdrFindResource_U (Address: 0x10019070)
  • LdrGetDllHandle (Address: 0x100190f0)
  • LdrGetProcedureAddress (Address: 0x10019000)
  • LdrLoadDll (Address: 0x10019010)
  • LdrLockLoaderLock (Address: 0x10019074)
  • LdrUnloadDll (Address: 0x10019034)
  • LdrUnlockLoaderLock (Address: 0x10019084)
  • memcpy (Address: 0x1001912c)
  • memmove (Address: 0x10019124)
  • memset (Address: 0x10019130)
  • NtAllocateVirtualMemory (Address: 0x100190ac)
  • NtClose (Address: 0x1001904c)
  • NtCreateFile (Address: 0x100190bc)
  • NtCreateKey (Address: 0x100190e8)
  • NtDelayExecution (Address: 0x100190b4)
  • NtDeleteKey (Address: 0x100190d0)
  • NtDeleteValueKey (Address: 0x10019044)
  • NtFreeVirtualMemory (Address: 0x10019098)
  • NtOpenKey (Address: 0x100190d4)
  • NtProtectVirtualMemory (Address: 0x100190f4)
  • NtQueryInformationProcess (Address: 0x10019030)
  • NtQueryKey (Address: 0x100190cc)
  • NtQueryPerformanceCounter (Address: 0x10019114)
  • NtQuerySystemTime (Address: 0x10019028)
  • NtQueryValueKey (Address: 0x10019064)
  • NtQueryVirtualMemory (Address: 0x10019008)
  • NtReadVirtualMemory (Address: 0x10019048)
  • NtResumeThread (Address: 0x100190fc)
  • NtSetValueKey (Address: 0x1001905c)
  • NtTerminateProcess (Address: 0x10019020)
  • NtWaitForSingleObject (Address: 0x100190c8)
  • NtWriteFile (Address: 0x1001909c)
  • RtlAcquirePebLock (Address: 0x10019078)
  • RtlAllocateHeap (Address: 0x1001906c)
  • RtlAnsiStringToUnicodeString (Address: 0x10019104)
  • RtlApplicationVerifierStop (Address: 0x10019068)
  • RtlCaptureContext (Address: 0x1001911c)
  • RtlCaptureStackBackTrace (Address: 0x10019040)
  • RtlCompareMemory (Address: 0x100190f8)
  • RtlCompareUnicodeString (Address: 0x10019100)
  • RtlCopyUnicodeString (Address: 0x100190a8)
  • RtlDeleteCriticalSection (Address: 0x10019094)
  • RtlDllShutdownInProgress (Address: 0x1001900c)
  • RtlDoesFileExists_U (Address: 0x100190c4)
  • RtlDosPathNameToNtPathName_U (Address: 0x100190a4)
  • RtlEnterCriticalSection (Address: 0x10019050)
  • RtlFindClearBitsAndSet (Address: 0x10019088)
  • RtlFreeHeap (Address: 0x10019080)
  • RtlFreeUnicodeString (Address: 0x100190a0)
  • RtlImageDirectoryEntryToData (Address: 0x10019108)
  • RtlImageNtHeader (Address: 0x1001910c)
  • RtlInitAnsiString (Address: 0x100190e0)
  • RtlInitializeCriticalSection (Address: 0x100190b8)
  • RtlInitUnicodeString (Address: 0x1001903c)
  • RtlInitUnicodeStringEx (Address: 0x100190dc)
  • RtlLeaveCriticalSection (Address: 0x10019058)
  • RtlQueryEnvironmentVariable_U (Address: 0x100190b0)
  • RtlRaiseException (Address: 0x10019060)
  • RtlRandom (Address: 0x10019110)
  • RtlReleasePebLock (Address: 0x1001908c)
  • RtlUnhandledExceptionFilter (Address: 0x10019120)
  • RtlUnicodeStringToAnsiString (Address: 0x1001907c)
  • RtlUnwind (Address: 0x10019128)
  • wcsrchr (Address: 0x100190ec)
  • wcsstr (Address: 0x100190e4)
  • wcstoul (Address: 0x100190d8)